Security News > 2020 > May > Bluetooth Vulnerability Allows Attackers to Impersonate Previously Paired Devices
A vulnerability related to pairing in Bluetooth Basic Rate / Enhanced Data Rate connections could be exploited to impersonate a previously paired device, researchers have discovered.
The security flaw allows for an attacker within Bluetooth range of an affected device to spoof the Bluetooth address of a previously bonded remote device, thus successfully authenticating without knowing the link key normally used for establishing an encrypted connection.
"It is possible for an unauthenticated, adjacent attacker to impersonate a previously paired/bonded device and successfully authenticate without knowing the link key. This could allow an attacker to gain full access to the paired device by performing a Bluetooth Impersonation Attack," a CERT Coordination Center alert reads.
In a statement published on this vulnerability, the Bluetooth Special Interest Group explains that the attacks allow hackers to "Negotiate a reduced encryption key strength" if the device is still vulnerable to the KNOB attack disclosed last year.
For the attack to be successful, the attacker needs to know the Bluetooth address of the remote device to which the target was previously paired.